Aaron Margosis' "Non-Admin" WebLog : LUA Buglight 2.0, second preview:
http://blogs.msdn.com/aaron_margosis/archive/2008/11/06/lua-buglight-2-0-second-preview.aspx



Mark Rockman wrote:
> It be difficult to determine /a priori/ the settings for all the 
> access control lists and other security parameters that one must 
> establish for CAS to work.  Perhaps a software assist would work 
> according to the following scenario.  Run the program in the 
> environment in which it will actually be used.  Assume minimal 
> permissions.  Each time the program would fail due to violation of 
> some permission, notate the event and plow on.  Assuming this is 
> repeated for every use case, the resulting reports would be a very 
> good guide to how CAS settings should be established for production.  
> Of course, everytime the program is changed in any way, the process 
> would have to be repeated.
>  
> MARK ROCKMAN
> MDRSESCO LLC
> ------------------------------------------------------------------------
>
> _______________________________________________
> Secure Coding mailing list (SC-L) SC-L@securecoding.org
> List information, subscriptions, etc - http://krvw.com/mailman/listinfo/sc-l
> List charter available at - http://www.securecoding.org/list/charter.php
> SC-L is hosted and moderated by KRvW Associates, LLC (http://www.KRvW.com)
> as a free, non-commercial service to the software security community.
> _______________________________________________
>   
_______________________________________________
Secure Coding mailing list (SC-L) SC-L@securecoding.org
List information, subscriptions, etc - http://krvw.com/mailman/listinfo/sc-l
List charter available at - http://www.securecoding.org/list/charter.php
SC-L is hosted and moderated by KRvW Associates, LLC (http://www.KRvW.com)
as a free, non-commercial service to the software security community.
_______________________________________________

Reply via email to